Sony’s PlayStation Network is reported to have 70 million registered users worldwide. On May 2, 2011, Sony issued a statement that 12,700 credit cards and 24.6 million user accounts were compromised. The stolen data included names, addresses, dates of birth, passwords, security questions and answers and credit card information. This compromise is said to be one of the largest and most high-profile online data thefts to date.
The University of Arizona, like major research universities across the country, found that many of its grants and contracts were tied to higher levels of access security. Access to buildings with old-fashioned keys and locks or cards with magnetic strips swiped into pin pads didn’t provide the amount of security the University was looking for. So the school made the switch to smart cards.
In July 2010 I wrote about workplace violence within the healthcare industry in this column. The main focus was a document that was published by The Joint Commission titled, “Preventing violence in the health care setting.” I also discussed OSHA document 3148, “Guide for Preventing Workplace Violence for Healthcare Workers and Social Service Workers.” Both documents serve as a guide in the implementation of a workplace violence reduction program. In the column I stressed the need to install physical barriers in order to control access within specific areas of the facility. In addition, I emphasized the need to control visitors into the facility through the use of a visitor management system.
Add dirty hands, dust buildup, vandals, salt spray, electromagnetic interference and even explosions to the rain, sleet, snow and the gloom of night that can affect operation of access control systems, and especially readers in harsh conditions. And there is the stress on readers that must handle intensive traffic or electrical situations that can knock out gear for a period of time.
Once considered safe havens, health care institutions today are confronting steadily increasing rates of crime, including violent crime,” said an alert issued last year by the Joint Commission, a national accrediting agency.
Security technology and applications are evolving at an accelerating rate, driven by the recognition of the need for stronger security measures to create safer environments. Still, in every facility there will be a large number of physical keys that are in use and they must be considered when implementing or upgrading a security system.
Today, security is of utmost importance at the nation’s colleges and universities. Events such as the Virginia Tech shooting in 2007 remind administrators, parents and students of the stark reality that considering the safety of all individuals who visit, work or attend classes at college campuses is essential.
The events of September 11, 2001 changed the way business thought about perimeter security and access control. Rather than just a barrier to keep intruders out, fences and gates are installed with protection against potential terrorist attacks in mind.
Industries around the world are finding new use uses for RFID, and as the technology matures and prices drop, it becomes a more affordable option for applications like access management.